... DISTRIBUTED SOLUTIONS IN PRIVACY PRESERVING DATA MINING (Nghiên cu xây dng mt s gii pháp đm bo an toàn thông tin trong quá trình khai phá d liu) LUN ÁN TIN S ... B1=(ˆX1)TˆX2and A2+ B2= (ˆX2)TˆX1. Therefore, Alice and Bob can obtainC(1)and C(2), respectively, where C(1)+ C(2)=ˆXTˆX, and C(1)and C(2)can be presented as ... (ˆX2)TˆX2and (ˆX1)TˆX1can be locally computed without dis-closing raw data. In addition, using private matrix sharing protocol, Alicecan obtains A1and A2, Bob can obtains B1and B2,...